Security: Access


7 Steps for Dealing with the People Component of Data Security

We outline seven steps that help you address the people aspect of data security.

Q&A: Data Protection Strategies for Mobile Computing

Best practices for protecting your mobile and enterprise assets.

Q&A: Security in a Virtualized Environment

How are IT organizations responding to the new security challenges of administrative privileges in a virtualized environment?

Q&A: Identity and Access Management

What’s driving the interest in identity and access management, and how can you address the challenges the technology presents?

A 3-Step Defense-in-Depth Strategy for Combating Cyberterrorism

Learn how a "defense-in-depth" strategy can provide greater protection to your enterprise.

Q&A: IAM and the Unix/Linux Organization

Unix/Linux systems needn't be islands of identity; we show you the challenges and options for addressing authentication, provisioning, and security and take a closer look at Active Directory bridges.

Coming Clean: Getting a Handle on Permissions and Group Memberships

Sorting through legacy permissions can seem daunting; these suggestions will help you manage the project.



Getting the Most from Active Directory in the Enterprise

How IT can address the challenges of Active Directory

Top 10 IAM Challenges for Heterogeneous Enterprises -- Part 2 of 2

We examine the remaining five challenges and how Active Directory provides a solution.

Top 10 IAM Challenges for Heterogeneous Enterprises -- Part 1 of 2

As more users need multiple identities to access the applications they need regularly, IT has its hands full maintaining security.

Privileged Access in the Virtualized Data Center: How to Reduce Security Risks and Ensure Business Resiliency

No single solution can prevent all security risks in a virtualized data center, but automation can help.

Security Tops IT's Concerns, Symantec Study Finds

Global study of security personnel identifies goals, points out risks and staffing issues

Enterprise Applications in the Cloud: A SaaS Security Perspective

The security challenges and mitigation strategies to help you migrate your enterprise applications to the cloud while ensuring your data’s safety.

Q&A: Assessing Cybersecurity's Past, Planning for the Future

Where is cybersecurity headed? We look at how regulation, social networking, and popular technologies (such as cloud computing) will impact your enterprise’s security management.

The Sleeper Cellular Issue

IT organizations are highly exposed to security breaches through their information worker's mobile devices.

Security Focus in 2010: Internal Threats, Cloud Computing, and Mobile Devices

CA’s chief security architect discusses the three key areas for security professional’s attention this year.

Security: The Year in Review

Compared to other market segments, the security space was a relative safe harbor in a year of economic turbulence.

Q&A: Why Strong User IDs and Passwords are Weak Security Measures

Why a username and password are no longer adequate to protect your enterprise's assets.

Outsourcing's Impact on Network Security Still Uncertain

Despite IT pros' concerns about outsourcing's net effect on network security, the true impact is still unclear.

How to Avoid NAC Pitfalls with a Standards-Based Approach

With so many benefits to reap from network access control, why aren't all IT shops on board?